General

  • Target

    xghk.exe

  • Size

    68KB

  • Sample

    231220-p99xhschcn

  • MD5

    23ae5b23ad69d731d7a80dd015aea3b9

  • SHA1

    20b4f3d184e9772e2b38ce5e98c800ddb4bf18db

  • SHA256

    ac1b378f8477373ead4d963382c446c9e00c284e42cd6189a373a520dabcaf45

  • SHA512

    aaba2adf105528a5d41953de986bcf3e6db629043d457fb5933e1bf7017ce6c4631b14631e58deb31443061bcd47bc0651002142f2288c1f6ac88fb03b9c34fc

  • SSDEEP

    768:BCB8S+OR7dOahyoHokBtqN74W7bZZmYb9PyzcjRlYlwa6NVdkPnJJMIVV:BHJaAoHoc2x7bZoYBAcQlwJdMB

Malware Config

Targets

    • Target

      xghk.exe

    • Size

      68KB

    • MD5

      23ae5b23ad69d731d7a80dd015aea3b9

    • SHA1

      20b4f3d184e9772e2b38ce5e98c800ddb4bf18db

    • SHA256

      ac1b378f8477373ead4d963382c446c9e00c284e42cd6189a373a520dabcaf45

    • SHA512

      aaba2adf105528a5d41953de986bcf3e6db629043d457fb5933e1bf7017ce6c4631b14631e58deb31443061bcd47bc0651002142f2288c1f6ac88fb03b9c34fc

    • SSDEEP

      768:BCB8S+OR7dOahyoHokBtqN74W7bZZmYb9PyzcjRlYlwa6NVdkPnJJMIVV:BHJaAoHoc2x7bZoYBAcQlwJdMB

    • RunningRat

      RunningRat is a remote access trojan first seen in 2018.

    • RunningRat payload

    • Sets DLL path for service in the registry

    • Executes dropped EXE

    • Loads dropped DLL

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

1
T1112

Tasks